Our Blog

RSS

Each day we are being inundated with information. This could be in the form of ads, articles or a new tool to use that will surely make our lives easier. While these applications could be very useful to the organization, they could also…

Read More

Here at Core, we are continuously working to improve our products and services and we are ramping up for our newest release of Core Network Insight 6.3.  While the full release won't be ready for a few more days, we wanted to give you…

Read More

While it can be nerve-wracking letting someone into a portion of your organization, look at it as though you are actually taking back control. Enlisting the help of trained and experienced experts is nothing to be ashamed of – if anything, this could…

Read More

For those of you that have been living under a rock for the past few months, there has been quite a lot of talk about Russia and their interference in the 2016 U.S. election. From open session meetings to leaked documents and the…

Read More

We spend a lot of time talking around and about bad actors, but what if we sourced them to teach us about this industry instead? We know they exist and we know they’re working towards obtaining the sensitive data on our networks. But…

Read More

 1. Introduction In this blog post, we will cover the analysis and exploitation of a simple heap buffer overflow found in SAPCAR a few weeks ago. SAP published security note #2441560 classifying the issue as "Potential Denial of Service". This post is our attempt to show…

Read More

So I know that everyone was worried about WannaCry and the Ransomware epidemic that we just had. Though this type of attack isn’t new, this one particular instance got so much attention because it was such a large attack and affected many in…

Read More

Businesses are not prepared for advanced malware. This may seem like a harsh statement but as this week’s POS breach at Chipotle showed us, it is true. According to the 2017 Verizon Wireless Data Breach Report, over half (51%) of breaches included malware…

Read More

You may know that you need to penetration test your organization for the sake of compliance - but there is more to gain from a pen-test than just adhering to set regulations to avoid a fine.  We've compiled a list of reasons to pen-test…

Read More

There is no doubt about it, the Internet of Things (IoT) has made life better. I’m not just talking about the fact that I can be connected 24/7 through my laptop, tablet or phone. The rapid expansion of devices that are connected to…

Read More